Match Document Document Title
9043588 Method and apparatus for accelerating connections in a cloud network  
Various embodiments provide a method and apparatus of providing accelerated encrypted connections in a cloud network supporting transmission of data including per-user encrypted data. Transmission...
9037656 Method and system for facilitating interaction with multiple content provider websites  
A method and system for facilitating interaction between an electronic device and a plurality of content provider websites are disclosed. In one embodiment, the method includes receiving at a...
9031536 Method for mitigating the unauthorized use of a device  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9009832 Community-based defense through automatic generation of attribute values for rules of web application layer attack detectors  
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (ADs), which are coupled between HTTP clients and web application servers. The...
9003556 Techniques for in-app user data authorization  
Techniques for in-app user data authorization are described. An apparatus may comprise a processor circuit, a permissions component, and a token component. The permissions component may be...
9003478 Enforcement of conditional policy attachments  
Framework for conditionally attaching web service policies to a policy subject (e.g., a web service client or service endpoint) at subject runtime. In one set of embodiments, a constraint...
9003481 Out-of band network security management  
A computer-implemented method, network management system, and network clients are provided for out-of-band network security management. The network management system includes routers, firewalls,...
9003548 Method and system for digital rights management of documents  
A method and system of encrypting and decrypting documents and recipient rights.
8997189 Multiuse web service sign-in client side components  
Embodiments of multi-user web service sign-in client side components are presented herein. In an implementation, the currently authenticated user account of a first application of a client is...
8995663 Method for implementing an encryption engine by smart key device  
Disclosed is a method for implementing an encryption engine, which includes: when an engine binding interface is called, a hardware encryption engine establishes a connection with a hardware...
8997232 Iterative automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a computing device is coupled to a set of web application layer attack detectors (AD), which are coupled between HTTP clients and web application servers. The...
8990568 Mobile device enrollment for online banking transactions  
Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to:...
8990552 Method and apparatus for integrating precise time protocol and media access control security in network elements  
A transmit portion of a network device including a medium access control (MAC) module configured to receive a frame of data to be transmitted from the network device in accordance with a MAC...
8990920 Creating a virtual private network (VPN) for a single app on an internet-enabled device or system  
An Internet-enabled device, such as a smartphone, tablet, PC, wearable sensor, or household appliance, executes an application (or “app”) has its own VPN connection with a VPN gateway device. The...
8984619 Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration  
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method...
8984616 Efficient routing for reverse proxies and content-based routers  
Efficient routing for a client-server session or connection is provided in an application layer of multi-layered systems interconnect stack by caching a plurality of application-specific...
8978102 Network stimulation engine  
Methods, devices, and systems are disclosed for simulating a large, realistic computer network. Virtual actors statistically emulate the behaviors of humans using networked devices or responses...
8978160 Method for selective software rollback  
A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software...
8977842 Hypervisor enabled secure inter-container communications  
A secure component communication management system provides secure, trusted communication between components in a hypervisor based virtual computing environment. A hypervisor security extension...
8966590 Managing social network accessibility based on age  
When a user having an age less than a threshold age (a child user) attempts to access an online service or perform actions using the online service, the online service obtains parental...
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8955052 System and method for maintaining dual identity in a server process  
A method, system and computer-usable medium are disclosed for managing identity authorizations to access information processing system resources. An application thread requiring access to target...
8954725 Sanitization of packets  
Methods, systems, and computer-readable media are disclosed for packet sanitization. A particular method intercepts a packet of a packet stream, where the packet stream is transmitted in...
8954692 File protecting method and system, and memory controller and memory storage apparatus thereof  
A file protecting method and system and a memory controller and a memory storage apparatus using the same are provided. The file protecting method includes performing a file protection enabling...
8955117 System and method to locate a prefix hijacker within a one-hop neighborhood  
Method, system and computer-readable device to locate a prefix hijacker of a destination prefix within a one-hop neighborhood. The method includes generating one-hop neighborhoods from autonomous...
8949967 Information management apparatus, information management method, and non-transitory computer-readable storage medium  
An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the...
8949968 Multi-service VPN network client for mobile device  
An integrated, multi-service network client for cellular mobile devices is described. The multi-service network client can be deployed as a single software package on cellular mobile network...
8949974 Mobile device with password protected desktop screen  
A mobile device includes a user interface that has a plurality of non-password-protected desktop screens and at least one password protected desktop screen. The mobile device includes a touch...
8942719 Locating a nearby mobile device without using GPS  
A method, system, and medium are provided for locating a lost mobile device utilizing a radio frequency signal associated with the lost mobile device. One embodiment of the method includes...
8943304 Systems and methods for using an HTTP-aware client agent  
Systems and methods are described for using a client agent operating in a virtual private network environment to intercept HTTP communications. Methods include: intercepting at the network layer,...
8931084 Methods and systems for scripting defense  
Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable...
8929548 Providing secured communication connections using a secured communication connection object  
An apparatus and method for establishing a communication connection between a first party and a second party using a secured communication connection object are provided. With the apparatus and...
8924708 Security switch  
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully...
8924725 Authenticated file handles for network file systems  
One or more file sharing computers receives a client request including an IP address and port number used by the client (computer). The one or more computers respond by creating an enhanced file...
8924709 Print release with end to end encryption and print tracking  
A method for encrypting print jobs that includes receiving output data, encrypting the output data with a randomly-generated symmetric session key, generating a session key header by encrypting...
8924707 Communicating confidential information between an application and a database  
Disclosed is a system and method for communicating confidential information in a resource friendly manner between an application and a database using an application programming interface, API. The...
8918632 Methods for analyzing application privacy and devices thereof  
A method, non-transitory computer readable medium, and policy rating server device that receives a request from a client computing device for one or more privacy ratings. The request identifies at...
8909967 Technique for secure computation  
A technique for secure computation obfuscates program execution such that observers cannot detect what instructions are being run at any given time. Rather, program execution and memory access...
8909916 Using a PKCS module for opening multiple databases  
A security initialization system obtains load data that identifies a first database storing security data to be opened. The initialization system determines that a PKCS-based module for opening...
8898451 Method and system for monitoring encrypted data transmissions  
A method for efficiently decrypting asymmetric SSL pre-master keys is divided into a key agent component that runs in user mode, and an SSL driver running in kernel mode. The key agent can take...
8898450 Hardware identity in multi-factor authentication at the application layer  
Device authentication is implemented at the application layer of a computer communication model to add a factor to user authentication without requiring any action by the user. User space...
8898732 Providing a managed browser  
Methods, systems, computer-readable media, and apparatuses for providing a managed browser are presented. In various embodiments, a computing device may load a managed browser. The managed browser...
8893282 System for detecting vulnerabilities in applications using client-side application interfaces  
An improved method and apparatus for client-side application analysis is provided. Client-side application analysis involves determining and testing, using client-side application interfaces and...
8893222 Security system and method for the android operating system  
A method of linking a security policy stored in a policy database that is specific to an application in the application layer with a new corresponding process launched in the LINUX layer in a...
8887265 Named sockets in a firewall  
A proxy device such as a firewall uses an internal socket namespace such as a text string such that connection requests must be explicitly redirected to a listening socket in the alternate...
8880868 Secure deterministic fabric for safe and secure product design  
A secure deterministic fabric includes switches that segregate data traffic requiring disparate levels of authentication or having different safety levels. Data may be segregated physically,...
8881286 Clustering processing method and device for virus files  
A method and device for clustering virus files is provided. The method involves statically analyzing binary data of virus files to be clustered, so as to obtain PE structure data of the virus...